Subscribe to RSS Feed (Opens in New Window)
A Global Perspective of Privacy Protection Practices Noushin Ashrafi, Boston, MA, United States. |
|
A Preliminary Taxonomy for Software Failure Impact Simone Krug, Information Systems, University of Mannheim, Mannheim, Ba-Wue, Germany. |
|
A Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES) Alan Rea, Western Michigan University, Kalamazoo, MI, United States. |
|
An Examination of the Success of Post-merger IT Integration Meng-Hsien Lin, Management of Information Systems, National Chengchi University, Taipei City, |
|
An RFID Survivability Impact Model in the Military Domain Joseph Julik, University of North Dakota, Grand Forks, ND, United States. |
|
Better Safe than Sorry: A Conceptual Framework for the Use of the Cloud Olajumoke Azogu, University of North Texas, Denton, TX, United States. |
|
Srikar Velichety, Management Information Systems, University of Arizona, Tucson, AZ, United States. |
|
Cloud Computing in the Financial Industry – A Road Paved with Security Pitfalls? Ulrich Lampe, Technische Universität Darmstadt, Darmstadt, Germany. |
|
Janine Spears, College of Computing and Digital Media, DePaul University, Chicago, IL, United States. |
|
Database Intrusion Detection: Defending Against the Insider Threat Kevin Barton, Computer Information Systems and Security, Our Lady of the Lake University, San Antonio, TX, United States. |
|
Exploring Organizational Human Resource Information System Security Humayun Zafar, Computer Science and Information Systems, Kennesaw State University, Kennesaw, GA, United States. |
|
"Heading for the Clouds?" Implications for Cloud Computing Adopters Norah Abokhodair, Information School, University of Washington, Seattle, WA, United States. |
|
Information Security Management: A System Dynamics Approach Derek Nazareth, University of Wisconsin Milwaukee, Milwaukee, WI, United States. |
|
Information Security Policy Compliance: The Role of Information Security Awareness Ahmad Al-Omari, College of Business and Information Systems, Dakota State University, Madison, SD, United States. |
|
Information Security Strategy: In Search of a Role Roger Seeholzer, Computer Studies, University of Maryland University College Europe, APO, United States. |
|
Instant Messaging privacy in the clouds Lizbeth Granda Paredes, Departamento de Computação, Universidad Federal de São Carlos, São Carlos, São Paulo, Brazil. |
|
Matrix Passwords: A Proposed Methodology of Password Authentication Xiao Zhang, Systems and Tchnology Management, University of Texas at San Antonio, San Antonio, TX, United States. |
|
Offshored Data Privacy: Determining the Factors and their relative Effect Anupam Nath, Business Admin, Elizabeth City State University, Elizabeth City, NC, United States. |
|
Password Policy Effects on Entropy and Recall: Research in Progress Jim Marquardson, Center for the Management of Information, University of Arizona, Tucson, AZ, United States. |
|
Perceived Privacy Breach – the Construct, the Scale, and its Antecedents Altaf Ahmad, Information Systems, Arizona State University, Tempe, AZ, United States. |
|
Prospect Theory and Information Security Investment Decisions Diana Young, Information Systems, University of Texas at San Antonio, San Antonio, TX, United States. |
|
Humayun Zafar, Department of Information Systems, Kennesaw State University, Kennesaw, GA, United States. |
|
SOCIAL COMMERCE: THE ROLE OF TRUST Mahmood Hajli, Birkbeck, University of London, london, United Kingdom. |
|
Jeffrey Wall, Information Systems and Operations Management, University of North Carolina--Greensboro, Greensboro, NC, United States. |
|
The Influence of Technology Characteristics on Privacy Calculus: A Theoretical Framework Mohammad Najjar, University of Memphis, Memphis, TN, United States. |
|
Robert Crossler, Department of Management and Information Systems, Mississippi State University, Mississippi State, MS, United States. |
|
The Role of Individual Characteristics on Insider Abuse Intentions Merrill Warkentin, Mgmt & Information Systems, Mississippi State University, Mississippi State, MS, United States. |
|
Bartlomiej Hanus, Information Technology & Decision Sciences, University of North Texas, Denton, TX, United States. |
|
Using Domain Knowledge to Facilitate Cyber Security Analysis Peng He, Information Systems, UMBC, Baltimore, MD, United States. |